CJIS Security Test/25 Questions
and Answers/100% Verified
FBI CJI data is sensitive information and security shall be afforded to prevent
any unauthorized access, use or dissemination of the data. - -True
-FBI CJI data must be safeguarded to prevent: - -All of the Above
-Unauthorized requests, receipts, release, interception, dissemination or
discussion of FBI CJI data could result in criminal prosecution and/or
termination of employment. - -True
-A security incident shall be reported to the CJIS Systems Agency's (CSA's)
Information Security Officer (ISO) and include the following information: date
of the incident, location(s) of incident, systems affected, method of
detection, nature of the incident, description of the incident, actions
taken/resolution, date and contact information for the agency. - -True
-Training for appropriate personnel would include people who read criminal
histories but do not have a NCIC workstation of their own. - -True
-A security incident is a violation or attempted violation of the FBI CJIS
Security Policy or other security policy that would threaten the
confidentiality, integrity or availability of FBI or State CJI data. - -True
-FBI CJI data is any data derived from the national CJIS Division Systems. - -
True
-Electronic media includes, but is not limited to: - -All of the Above
-According to many security experts, which group constitutes the biggest
threat: - -The agency's own personal
-Users do not need to log off of the software/system at the end of the shift
or when another operator wants to use the software/system. - -False
-Training for appropriate personnel would include vendors who develop
software for NCIC access. - -True
-You should never email Criminal Justice Information (CJI) unless your
agency's email system meets all the requirements outlined in latest CJIS
Security policy. - -True
and Answers/100% Verified
FBI CJI data is sensitive information and security shall be afforded to prevent
any unauthorized access, use or dissemination of the data. - -True
-FBI CJI data must be safeguarded to prevent: - -All of the Above
-Unauthorized requests, receipts, release, interception, dissemination or
discussion of FBI CJI data could result in criminal prosecution and/or
termination of employment. - -True
-A security incident shall be reported to the CJIS Systems Agency's (CSA's)
Information Security Officer (ISO) and include the following information: date
of the incident, location(s) of incident, systems affected, method of
detection, nature of the incident, description of the incident, actions
taken/resolution, date and contact information for the agency. - -True
-Training for appropriate personnel would include people who read criminal
histories but do not have a NCIC workstation of their own. - -True
-A security incident is a violation or attempted violation of the FBI CJIS
Security Policy or other security policy that would threaten the
confidentiality, integrity or availability of FBI or State CJI data. - -True
-FBI CJI data is any data derived from the national CJIS Division Systems. - -
True
-Electronic media includes, but is not limited to: - -All of the Above
-According to many security experts, which group constitutes the biggest
threat: - -The agency's own personal
-Users do not need to log off of the software/system at the end of the shift
or when another operator wants to use the software/system. - -False
-Training for appropriate personnel would include vendors who develop
software for NCIC access. - -True
-You should never email Criminal Justice Information (CJI) unless your
agency's email system meets all the requirements outlined in latest CJIS
Security policy. - -True